CVE-2024-46906
📋 TL;DR
A SQL injection vulnerability in WhatsUp Gold allows authenticated users with at least Report Viewer permissions to escalate privileges to admin accounts. This affects WhatsUp Gold versions before 2024.0.1, potentially compromising the entire monitoring system.
💻 Affected Systems
- WhatsUp Gold
📦 What is this software?
Whatsup Gold by Progress
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover where an attacker gains full administrative control, can modify configurations, access sensitive data, and potentially pivot to other systems.
Likely Case
Privilege escalation leading to unauthorized administrative access, allowing attackers to view/modify network monitoring data and system settings.
If Mitigated
Limited impact if proper input validation and least privilege principles are enforced, though SQL injection attempts may still be logged.
🎯 Exploit Status
Requires authenticated access with Report Viewer or higher permissions; SQL injection knowledge needed for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024.0.1 or later
Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024
Restart Required: No
Instructions:
1. Download WhatsUp Gold 2024.0.1 or later from Progress website. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Verify installation completes successfully.
🔧 Temporary Workarounds
Restrict Report Viewer Access
allLimit Report Viewer permissions to only trusted users who absolutely need this access level.
Network Segmentation
allIsolate WhatsUp Gold server from general network access and restrict connections to authorized management systems only.
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries at application level if source code access is available.
- Deploy web application firewall (WAF) with SQL injection protection rules and monitor for exploitation attempts.
🔍 How to Verify
Check if Vulnerable:
Check WhatsUp Gold version in Administration > About. If version is below 2024.0.1, system is vulnerable.
Check Version:
Check via WhatsUp Gold web interface: Administration > About, or examine installation directory version files.
Verify Fix Applied:
Verify version is 2024.0.1 or higher in Administration > About, then test that SQL injection attempts are properly blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts followed by successful Report Viewer login
- User privilege changes from Report Viewer to Administrator
Network Indicators:
- SQL injection patterns in HTTP requests to WhatsUp Gold web interface
- Unusual database connections from application server
SIEM Query:
source="whatsup_gold_logs" AND (event_type="privilege_escalation" OR sql_query="*UNION*" OR sql_query="*SELECT*FROM*users*")